Data-provenance Verification for Secure Hosts

نویسنده

  • Sunitha R
چکیده

Network or host-based signature scanning approaches alone were proven inadequate against new and emerging malware. We view malicious bots or malware in general as entities stealthily residing on a human user’s computer and interacting with the user’s computing resources. In this existing work we need to improve the trustworthiness of a host and its system data. Specifically, we provide a new mechanism that ensures the correct origin or provenance of critical system information and prevents adversaries from utilizing host resources. We define data-provenance integrity as the security property stating that the source where a piece of data is generated cannot be spoofed or tampered with. We describe a cryptographic provenance verification approach for ensuring system properties and system-data integrity at kernel-level. Its two concrete applications are demonstrated in the keystroke integrity verification and malicious traffic detection. Specifically, we first design and implement an efficient cryptographic protocol. The protocol prevents the forgery of fake key events by malware under reasonable assumptions. Then, we demonstrate our provenance verification approach by realizing a lightweight framework for restricting outbound malware traffic. We propose a malware detection approach based on the characteristic behaviors of human users. We explore the human-malware differences and classifies them to aid the detection of infected hosts by using support vector Machine (SVM) models. The server can collects the keystroke of particular client and classifies using SVM then verifies the data provenance for secure host. The existing Cryptographic provenance verification fails to detect the malware or trustworthiness of client in their own machine means it can be easily finds the trustworthy by the server using the classification models. There are two main challenges in this proposed work: one is how to select characteristic behavior features for classification, and the other is how to prevent malware forgeries.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secure Provenance Scheme For Packet Drop Attacks In Wireless Sensor Networks

This paper presents a scheme to securely transmit provenance for the sensor data. Prove the effectiveness and efficiency of the secure provenance scheme in detecting packet loss attacks. Data are collected from multiple sources through the middle processing nodes. Propose a scheme to securely transmit Provenance for data and introduce a efficient mechanism for provenance verification and recons...

متن کامل

Using Blockchain and smart contracts for secure data provenance management

Blockchain technology has evolved from being an immutable ledger of transactions for cryptocurrencies to a programmable interactive environment for building distributed reliable applications. Although, blockchain technology has been used to address various challenges, to our knowledge none of the previous work focused on using blockchain to develop a secure and immutable scientific data provena...

متن کامل

Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing nodes that aggregate information. A malicious adversary may introduce additional nodes in the network or compromise existing ones. Therefore, assuring high data trustw...

متن کامل

Accurate Detection of Provenance Forgery and Packet Drop Attacks in Wireless Sensor Networks

Wireless sensor networks are most increasingly used in several applications such as wild habitat monitoring, forest fire detection and military surveillance area. Large-scale sensor networks are deployed in numerous application domains, and the data they collect are used in decision-making for critical infrastructures. Data are streamed from multiple sources through intermediate processing node...

متن کامل

A Secure and Efficient Framework for Data Transmission in Wireless Sensor Networks

---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Large scale sensor networks are applied in various applications and the information which they collect are used in decision making for complicated infrastructure. Information combined from various sources through intermediate nodes that aggregate d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013